You are here
Home > News > Technology

Say hello to 802.11ax: Wi-Fi 6 device certification begins today

I have an ancient Wifi setup in my home/office using a mix of kit from Netgear, Apple, Sky, BT...some of it more than 10 years old. This might give me an incentive to upgrade, eventually... Today, the Wi-Fi Alliance launched its Wi-Fi Certified 6 program, which means that the standard has been completely finalized, and device manufacturers and OEMs can begin the process of having the organization certify their products to carry the Wi-Fi 6 branding. If you need a bit ...

Microsoft pushes back end of support for Exchange Server 2010 by nine months

If you're running workloads on (very) old versions of Windows platforms, there's a little bit of pressure relief in this announcement. Microsoft would very much like you to move to Azure...: [...] The October 13, 2020 date aligns with the end of support for Office 2010 and SharePoint Server 2010. A reminder: Users cannot upgrade directly from Exchange Server 2010 on-premises to Exchange Server 2019. They will first have to go to Exchange 2013 or 2016, as Microsoft notes i

‘Smart cities’ are growing faster than IT officials can secure them

Mayor: Give me the shiny stuff, now CIO: Sure, but I'll need a gazillion % increase in budget Mayor: ...   [...] “We talk about the bright, shiny objects and all the potential that exists,” Jim Haskins, a business development manager for Cisco’s Smart and Connected Cities division, said at the Smart City Expo Atlanta conference. “Then we talk to the [chief information officer] and [chief technology officer] and it’s like, ‘Are you kidding me? You want me to dea

Red Cat Partners with GoChain for Blockchain-Based Drone Data Storage, Analytics, and Services …

Today's winners of the BS Bingo competition. It only needs the inclusion of 'AI' and 'Quantum' to sweep all before it...: [...] Red Cat developed the industry’s first blackbox flight recorder and distributed system for drones with security and encryption that regulators and insurance companies can trust. The platform includes several integrated systems that enable industry regulators to track and review drone flight data, insurance companies to insure drones with reliable th

Android 10: All the new features to expect from Google’s latest operating system

The one feature I'd really like to see is some way to educate users not to download apps without thinking "Do I really need this?" and "Do I trust this?"...: [...] With more than 2.5 billion devices around the world using Android, security has become a major concern for the developers of the OS. Just last month, cyber security researchers revealed that scam apps on Google Play had been downloaded more than 8 million times by Android users.] In an effort to better protect

How EDR is moving beyond the endpoint

More alphabet soup from security technology vendors. I read this as: "Current SIEM can't actually cope so we'll invent something new"...: [...] Traditional EDR technology collects telemetry data about events related to endpoints, such as application processes that connect to specific network addresses. But this data is often not fed to security information and event management (SIEM) systems, which could otherwise be overloaded with data. Yet, this data is essential for a

Encryption has created an uncrackable puzzle for the real world

Useful debate on encryption. One point it doesn't cover is the relatively simple countermeasure of fooling a targeted end user into installing a version of the client (WhatsApp, Signal, Telegram...) that enables surveillance. This already happens (take a look at dodgy VPN clients) so I'm not sure why it's not part of the debate...: [...] So why do politicians keep bringing this up? The cheap shot is to say they do it for the easy headlines. But the truth is, the costs of enc

Why Cloud Computing Cyber Security Risks Are On The Rise: Report

This article in Forbes makes the case that Cloud <>Secure. Making it very easy to deploy multiple instances of a container means that one misconfiguration or vulnerability is rapidly replicated, and may take aeons to clear up...: [...] Containers are the future of cloud computing, replacing in many cases the more traditional VMs architecture that is currently the foundation of most, if not all, enterprise cloud offerings. With containers, software developers can "pa

Huawei rules out cybersecurity risk management mechanism in cooperation with Chinese gov’t

Huawei makes the point that all of its competitors operate in China, and use Chinese-manufactured components in their products. There's a bigger point here. If you have a disk drive in your device, it probably came from Thailand, LCD screens from Taiwan, and so on. To talk about a product being 'Chinese' or 'European' is basically meaningless...: [...]Chen said Huawei has signed over 50 5G commercial contracts across the world. Twenty-eight of these were signed in Europe.

Google to clamp down on Incognito Mode detection

One incognito-mode use for me is to compare the prices I get offered where cookies are set against 'new visitor' pricing. Incognito isn't just for pr0n sites...: Google has chosen to remove a method websites could use to detect visitors that used Chrome's Incognito Mode when on a web site. When Chrome 76 lands at the end of July, sites will no longer be able to check if the FileSystem API is available or not. If it was not available, sites could deduce the visitor was in